Open resources

Commons

The work that belongs to everyone. Frameworks, workshop kits, and civic texts — released under CC BY so they can be used, adapted, and built upon without asking.

All materials are licensed CC BY 4.0 unless otherwise noted. Commercial use encouraged — just give credit. These resources are not legal advice and are provided as-is.

Currently in motion

XSTR.epoch

A Technical Paper on global coordination requirements for 2038-class rollover events.

Under development at ITU-T Study Group 17. Revision 1 was submitted on 18 May 2026 and runs approximately 100 pages, with a cross-sector exposure survey across thirty-one sectors against the Hayes (2005/2014) infrastructure taxonomy. The document develops the case that three timekeeping events arriving within a three-year window — the Network Time Protocol era rollover on 7 February 2036, the overflow of 32-bit signed Unix time_t on 19 January 2038, and the next GPS week-number rollover on 20 November 2038 — together constitute a category of global infrastructure risk that requires coordinated international response.

Read the background context →

Pre-publication under ITU-T review. The linked page is TLP:CLEAR background; the document itself is TLP:GREEN pending publication. Substantive reviewer engagement welcome before Revision 2 (December 2026).

For practitioners

The Hippocratic Oath of the Cybersecurity Practitioner

Primum non nocere.

An oath for practitioners — on honesty, restraint, uncertainty, stewardship, and the obligations that outlast the work itself.

Read the oath →

Offered as a tool, not a credential.

For the maintainers

On Constraints

A sonnet for the maintainers, the shepherds, and those who hold the line.

A short poem for the people who keep the fire, the watch, the vigil-tree — the FOSS volunteers, the standards stewards, the incident responders, the unfunded labour at the foundation of the systems everyone else depends on. Fourteen lines about constraints, the commons, and the work that goes uncounted.

Read the sonnet →

Offered as a tool, not a credential.

For friendships

The Friend Protocol

Principles for hard conversations among people who want to do them well.

A small set of principles that two or more people can agree to use together — so that when a difficult conversation tilts, they have somewhere to return to that does not require anyone to be the one who notices first. Nine principles plus eight annexes for the conditions that make conversations harder: asymmetry, status, time pressure, identity, capacity, state, and the seasons that are larger than any single day.

Read the protocol →

Offered as a tool, not a credential.

Companion pieces in the Field Manual: When Minds Become the Problem (a diagnostic note) and The Cafe Between Watches (a short fiction vignette).
For the disoriented

Knights Chess

A chess variant for thinking about decision-making when the rules themselves are unstable.

Both kings begin in check. The pieces are configured in ways that violate ordinary chess geometry. Standard rules about check and checkmate are suspended for an opening phase that ends not by move count but by the first capture — which, once made, snaps every ordinary rule immediately and fully back into force. A teaching artefact for decision-making under polycrisis conditions, debuted at ITU-T SG17 in December 2025.

Read the rules →

Offered as a tool, not a credential.

Working proof — v0.9 draft

On the Undecidability of Instruction Boundaries in Unified Representation Systems — Or: Why Prompt Injection Is Not a Bug

A proof that prompt injection is not a software bug awaiting a patch — it is a structural consequence of unified representation system expressiveness, by reduction to Rice's theorem. Connects ninety years of pattern across Gödel (1931), Von Neumann (1945), and contemporary LLMs (2020s). With implications for security architecture, system design, and procurement policy.

Read the proof →

Working draft, v0.9. Privately circulated since December 2025 in search of co-authors; now published openly for critique. Refinement expected. Co-authors and reviewers welcome.

Working proof — v0.9 draft

The Gödel–Chaitin Modeling Boundary — Or, Why There's No Digital Twin for Causality

A proof that the same formal boundary — Kolmogorov incompressibility, Lyapunov instability, Gödelian incompleteness, and Chaitinian randomness — manifests across three domains: digital twins of complex systems, language-theoretic security, and prompt injection in large language models. The claim: these are not separate engineering problems but a single mathematical constraint on self-describing systems, encountered from different angles.

Read the proof →

Working draft, v0.9. Privately circulated since December 2025 in search of co-authors; now published openly for critique. Refinement expected. Co-authors and reviewers welcome.

Draft Internet standard

The Meridian Protocol

A proposed Internet standard for prospective web preservation, authorized mirroring, and DNS failover. Meridian gives authors a way to authorize preservation of their sites before they go dark — with cryptographically verifiable, URL-preserving failover to live mirrors.

View on GitHub →

Early draft — seeking co-authors, implementers, and mirror operators. Get in touch if that’s you.

Workshop kit

2038-Class Risk Exposure Matrix

A free, open framework for assessing systemic infrastructure risk (time-related or otherwise), with a complete workshop kit for running your own internal sessions.

Learn more →

Building on the Matrix: a CC-BY 30-minute executive briefing workshop (deck + facilitation plan) for C-level and policy audiences is in development. If you have experience facilitating in government or corporate leadership environments and want to help beta test it in a small, vetted group, contact me with a sentence or two on your context and why you can help make this framing land.